apollo-server-integrations / apollo-server-integration-cloudflare-workers

An integration to use Cloudflare Workers as a hosting service with Apollo Server
https://github.com/kimyvgy/worker-apollo-server-template
MIT License
16 stars 0 forks source link

chore(deps): update dependency @apollo/server-integration-testsuite to v4.7.4 #42

Closed renovate[bot] closed 1 year ago

renovate[bot] commented 1 year ago

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
@apollo/server-integration-testsuite 4.7.3 -> 4.7.4 age adoption passing confidence

Release Notes

apollographql/apollo-server ### [`v4.7.4`](https://togithub.com/apollographql/apollo-server/blob/HEAD/packages/integration-testsuite/CHANGELOG.md#​474) [Compare Source](https://togithub.com/apollographql/apollo-server/compare/@apollo/server-integration-testsuite@4.7.3...@apollo/server-integration-testsuite@4.7.4) ##### Patch Changes - [#​7604](https://togithub.com/apollographql/apollo-server/pull/7604) [`aeb511c7d`](https://togithub.com/apollographql/apollo-server/commit/aeb511c7d7b3b7260b33c7e392580bac6565e465) Thanks [@​renovate](https://togithub.com/apps/renovate)! - Update `graphql-http` dependency - [`0adaf80d1`](https://togithub.com/apollographql/apollo-server/commit/0adaf80d1ee51d8c7e5fd863c04478536d15eb8c) Thanks [@​trevor-scheer](https://togithub.com/trevor-scheer)! - Address Content Security Policy issues The previous implementation of CSP nonces within the landing pages did not take full advantage of the security benefit of using them. Nonces should only be used once per request, whereas Apollo Server was generating one nonce and reusing it for the lifetime of the instance. The reuse of nonces degrades the security benefit of using them but does not pose a security risk on its own. The CSP provides a defense-in-depth measure against a *potential* XSS, so in the absence of a *known* XSS vulnerability there is likely no risk to the user. The mentioned fix also coincidentally addresses an issue with using crypto functions on startup within Cloudflare Workers. Crypto functions are now called during requests only, which resolves the error that Cloudflare Workers were facing. A recent change introduced a `precomputedNonce` configuration option to mitigate this issue, but it was an incorrect approach given the nature of CSP nonces. This configuration option is now deprecated and should not be used for any reason since it suffers from the previously mentioned issue of reusing nonces. Additionally, this change adds other applicable CSPs for the scripts, styles, images, manifest, and iframes that the landing pages load. A final consequence of this change is an extension of the `renderLandingPage` plugin hook. This hook can now return an object with an `html` property which returns a `Promise` in addition to a `string` (which was the only option before). - Updated dependencies \[[`0adaf80d1`](https://togithub.com/apollographql/apollo-server/commit/0adaf80d1ee51d8c7e5fd863c04478536d15eb8c)]: - [@​apollo/server](https://togithub.com/apollo/server)[@​4](https://togithub.com/4).7.4

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.



This PR has been generated by Mend Renovate. View repository job log here.